Skip to main content

Compliance Audits and External Communications#


Tuna may be requested occasionally to share additional details regarding its compliance, privacy and security program by an external entity such as a customer, media, legal or law enforcement. Such external communication, beyond what is already publicly published, needs to comply with the following policies and procedures.

Policy Statements#

Tuna policy requires that:

(a) Tuna operations must comply with all applicable laws, regulations, security standards and frameworks. External audits shall be conducted accordingly to each applicable compliance requirement.

  • PCI. Tuna must protect the payment card data processed and/or stored according to the requirements in the latest Payment Card Industry Data Security Standard (PCI DSS).

(b) All external communications related to compliance and customer/employee privacy must follow pre-established procedures and handled by approved personnel. This includes but is not limited to distribution of audit reports, assessment results, incidents and breach notification.

(c) Audit and compliance reports may be shared with an external party only when under signed NDA and approved by Tuna Security and/or Privacy Officer.

Controls and Procedures#

Compliance Program Management#

Tuna management and security/compliance team has identified and regularly reviews all relevant statutory, regulatory, and contractual requirements.

Tuna's compliance policy includes requirements to meet any and all applicable compliance requirements.

Additionally, the Vendor Risk Management policies and procedures specify the details related to contractual agreements with clients, partners and vendors, as well as requirements and process related to intellectual property rights and the use of proprietary software products.

Requesting Audit and Compliance Reports#

Tuna, at its sole discretion, shares audit reports, including any Corrective Action Plans (CAPs) and exceptions, with customers on a case by case basis. All audit reports are shared under explicit NDA in Tuna format between Tuna and party to receive materials. Audit reports can be requested by Tuna workforce members for Customers or directly by Tuna Customers.

The following process is used to request audit reports:

  1. A request may be sent by email to or by submitting a request via Tuna Internal Support Portal or Email. In the request, please specify the type of report being requested and any required timelines for the report.
  2. An Issue with the details of the request into the Tuna Security Project on Jira, which is used to track requests status and outcomes.
  3. Tuna security team will confirm if a current NDA is in place with the party requesting the audit report. If there is no NDA in place, Tuna will send one for execution.
  4. Once it has been confirmed that an NDA is executed, Tuna staff will move the Jira Issue to "Under Review".
  5. The Tuna Security Officer or Privacy Officer must Approve or Reject the Issue. If the Issue is rejected, Tuna will notify the requesting party that we cannot share the requested report.
  6. If the Issue has been Approved, Tuna will send the customer the requested audit report and complete the Jira Issue for the request.

See detailed policy and procedures in Breach Notification

External Audits of Information Access and Activity#

Prior to contracting with an external audit firm, Tuna shall:

  • Outline the audit responsibility, authority, and accountability
  • Choose an audit firm that is independent of other organizational operations
  • Ensure technical competence of the audit firm staff
  • Require the audit firm's adherence to applicable codes of professional ethics
  • Assign organizational responsibility for supervision of the external audit firm

Whenever possible, a third party auditing vendor should not be providing the organization IT oversight services (e.g., vendors providing IT services should not be auditing their own services to ensure separation of duties).

Contacts for External Communications Requests#

Direct all other communication requests to one of the following:

Continuous Compliance Monitoring#

The status of compliance is tracked via AWS Security Hub and internal tools. Compliance dashboards are configured with applicable internal and external standards and frameworks. Any potential gaps detected are reported on the compliance dashboards.